Visible to the public FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers

TitleFTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers
Publication TypeJournal Article
Year of Publication2018
AuthorsFan, Chun-I, Chen, I-Te, Cheng, Chen-Kai, Huang, Jheng-Jia, Chen, Wen-Tsuen
JournalIEEE Systems Journal
Volume12
Pagination473–484
ISSN1937-9234
KeywordsAccess Control, ciphertext transmission, complete secure file transfer protocol, Computer architecture, computer network security, cryptography, data confidentiality, data reencryption, file transfer protocol, Formal Security Models, FTP-NDN, Human Behavior, Internet, named data network, Named Data Network Security, Named Data Networking (NDN), NDN nodes, network flow requirement, network traffic, nondesignated receivers, Protocols, pubcrawl, re-encryption, Receivers, Resiliency, Scalability, Servers, storage costs, TCP-IP networks, telecommunication traffic, transport protocols, unknown potential receivers, usage amount, users, video services
AbstractDue to users' network flow requirement and usage amount nowadays, TCP/IP networks may face various problems. For one, users of video services may access simultaneously the same content, which leads to the host incurring extra costs. Second, although nearby nodes may have the file that a user wants to access, the user cannot directly verify the file itself. This issue will lead the user to connect to a remote host rather than the nearby nodes and causes the network traffic to greatly increase. Therefore, the named data network (NDN), which is based on data itself, was brought about to deal with the aforementioned problems. In NDN, all users can access a file from the nearby nodes, and they can directly verify the file themselves rather than the specific host who holds the file. However, NDN still has no complete standard and secure file transfer protocol to support the ciphertext transmission and the problem of the unknown potential receivers. The straightforward solution is that a sender uses the receiver's public key to encrypt a file before she/he sends the file to NDN nodes. However, it will limit the behavior of users and incur significant storage costs of NDN nodes. This paper presents a complete secure file transfer protocol, which combines the data re-encryption, satisfies the requirement of secure ciphertext transmission, solves the problem of the unknown potential receivers, and saves the significant storage costs of NDN nodes. The proposed protocol is the first one that achieves data confidentiality and solves the problem of the unknown potential receivers in NDN. Finally, we also provide formal security models and proofs for the proposed FTP-NDN.
DOI10.1109/JSYST.2016.2580299
Citation Keyfan_ftp-ndn_2018